ioFTPD is probably in the world the first ever FTP Server which supports TLS 1.3!.
Curl output :
Code:
* Trying 127.0.0.1...
* TCP_NODELAY set
* Connected to 127.0.0.1 (127.0.0.1) port 5420 (#0)
< 220 FTP Server ready.
> AUTH SSL
< 234 AUTH SSL successful.
* Cipher selection: TLS13-CHACHA20-POLY1305-SHA256
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* Server certificate:
* subject: CN=ioFTPD
* start date: Dec 27 13:21:15 2018 GMT
* expire date: Dec 25 13:21:15 2028 GMT
* issuer: CN=ioFTPD
* SSL certificate verify result: self signed certificate (18), continuing anyway.
> USER ioFTPD
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* old SSL session ID is stale, removing
< 331 Password required for ioFTPD.
> PASS ioFTPD
< 230-User ioFTPD from 192.150.14.69, welcome to our FTP server.
< 230-
< 230-ioFTPD activity:
< 230-
< 230- Users online : 2
< 230- Active transfers : 0
< 230- Uptime : 29 secs
< 230-
< 230-Enjoy your stay.
< 230 User ioFTPD logged in.
> PBSZ 0
< 200 PBSZ 0 successful.
> PROT P
< 200 Protection set to: Private.
> PWD
< 257 "/" is current directory.
* Entry path is '/'
> EPSV
* Connect data stream passively
< 500 'EPSV': Command not understood
* Failed EPSV attempt. Disabling EPSV
> PASV
* ftp_perform ends with SECONDARY: 0
< 227 Entering Passive Mode (127,0,0,1,21,48)
* Trying 127.0.0.1...
* TCP_NODELAY set
* Connecting to 127.0.0.1 (127.0.0.1) port 5424
* Connected to 127.0.0.1 (127.0.0.1) port 5420 (#0)
> TYPE I
< 200 Type set to I.
> SIZE test.log
< 213 5079
> RETR test.log
< 150 Opening BINARY mode data connection for test.log (5079 bytes) using SSL/TLS.
* Maxdownload = -1
* Getting file with size: 5079
* Doing the SSL/TLS handshake on the data stream
* Cipher selection: TLS13-CHACHA20-POLY1305-SHA256
* SSL re-using session ID
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* Server certificate:
* subject: CN=ioFTPD
* start date: Dec 27 13:21:15 2018 GMT
* expire date: Dec 25 13:21:15 2028 GMT
* issuer: CN=ioFTPD
* SSL certificate verify result: self signed certificate (18), continuing anyway.
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* old SSL session ID is stale, removing
None of the any FTP Client for windows supporting TLS 1.3, except curl :-(